Tagged as: identity theft

Four Steps to Protecting Personal Information Online

Having your personal information, like home address and phone number easily found online can leave you vulnerable to identity theft or in danger to a stalker. If you care to make the effort, there are steps to conceal information available about you in many public record databases. Most can be done quickly and inexpensively, other methods can be more costly and time consuming.

Keep in mind, it is virtually impossible to completely remove information available about yourself from public record. Some public information can be controlled, while others can not. For instance, property transactions and most court records will always be accessible to the public domain.

These efforts below are very effective, but not guaranteed. Please follow these preliminary steps listed to do the best you can to protect you and your family.

Here are four effective, but simple steps to controlling information about yourself listed on the web:

1) Open a P.O. Box for both personal mail and bills. Submit a change of address to your new post office box. This is the most effective and inexpensive thing you can do to swiftly remove your current address from a majority of “search sites” and public record databases.

2) Having an unlisted telephone number does not make your telephone number invisible to the public. This is one of the largest the misconceptions people have about having an unlisted number. Un-listing your telephone number simply keeps it out of directory assistance and white pages. The best thing you can do to control the distribution of your telephone number is to start with a new unlisted number and block caller ID information from being displayed when you place phone calls. Telephone numbers that at one time were listed, and are later unlisted, are most likely already widely distributed in the public record domain.

3) DO NOT put your name, number or personal information on any form or application without checking to reviewing their privacy policy. You will be surprised to find out how many credit card companies, banks, financial institutions and government agencies share or sell your information unless you specifically request that they do not distribute it.

4) Mail a written request to all major search sites and information suppliers requesting your information be removed. Some will comply, others will not. Most reputable companies have such a policy in place and soon will offer assistance in helping you contact information companies willing to remove your information.

How To: 6 Diva Tips for Stopping Stalkers

Did You Know One in Six Women Will Be A VICTIM of stalking?

Let me guess, you thought only celebrities had stalkers? Think again!

This growing epidemic which often leads to violence or murder, finally received its National recognition. On December 31, 2013, President Obama declared January as Stalking Awareness Month.

Here are 8 tips for you to protect yourself from being a victim of stalking:

1. Put a lock on your life!

Technology, although helpful, is a gateway to multiple types of crimes. We are often overly concerned with remembering our passwords, that we create less secure ones for our own comfort.
Create passwords that have high levels of security. Microsoft suggests having passwords with at least eight characters which DO NOT contain complete words.

2. They’re Free Anyway.

“Nothing in life is free.” Well, email can be! Using a simple “free email addresses” search on the web, we were able to find the “Top 11 Free Email Services” as of last month. Use multiple seperate email accounts for various purposes: personal bills and finances; a “sign up” account (for things you “sign up” for on the web); correspondence with family and friends; business

3. There Are No Reservations, You Do Not Have To Check In!

It’s understood how exciting it can be to stay social, using “selfies” and streaming video to connect with friends on the web. We strongly encourage not using the “check-in” feature on various apps to give your location until you are ready to depart. Apps like these keep an accurate account of your most visited areas making it easy to track and locate you.

4. Shredding Is Not Only For Cheese.

As hard as we try to be an eco-friendly Nation with electronic versions of everything; truth is, we still use paper. It would be understandably simple to mistake an overdue bill as junk mail when struggle is present. This is one of those good news, bad news scenarios. Good news: This too shall pass. Bad news: Personal Information and/or Identity Theft Invest in protecting your personal information, your local office supply store has inexpensive shredders (preferably one that shreds expired credit cards also)… Go get one!

5. Okay, You Are Cute! Now Put Your Badge Away!

If you are no longer at work, please take off your darn work badge. Do you realize having your name and workplace as a personal billboard is potentially life threatening? Someone can pose as a utility provider, mail man or jogger and have only those two things for you to feel comfortable enough to let down your guard if only for a few seconds. By calling your name and identifying where you work as a way to “me too” with you; those few seconds you are attempting to sort through your mental Contacts can allow an attacker to force his way into your home or you into his car.

6. Safeguard Your Smartphone

It’s funny how dumb our smartphones make us. Cell phones have evolved from a novelty to a necessity to many of us. Both parents and teens developed a dependency on them divulging every aspect of our lives willfully. It possesses our most personal photos; communication with family and friends and even our daily finances. If you could print all the information from your phone and put it in front of you, you would buy a vault to protect it. Add a simple pass code on your phone PIN, swipe or password to make your life line less accessible.

Find out how to “Prevent Your Ex From Cyber-Stalking

UA-60998580-1